SlideShare a Scribd company logo
1 of 13
Introduction to Computer
     Security Syllabus
     By Kenneth Ayebazibwe
       kynaye@gmail.com
  256774185458 / 256702555890
Course prerequisites or restrictive
            statements:
• Basic knowledge on operating systems; C
  programming skills
Student learning outcomes:
• By the end of this course, students will be able to:
    – State the basic concepts in information security, including security
      policies, security models, and security mechanisms.
    – Explain concepts related to applied cryptography, including plain-text,
      cipher-text, the four techniques for crypto-analysis, symmetric
      cryptography, asymmetric cryptography, digital
    – signature, message authentication code, hash functions, and modes of
      encryption operations.
    – Explain the concepts of malicious code, including virus, Trojan horse,
      and worms.
    – Explain common vulnerabilities in computer programs, including buffer
      overflow
    – vulnerabilities, time-of-check to time-of-use flaws, incomplete mediation.
    – Outline the requirements and mechanisms for identification and
      authentication
– Explain issues about password authentication, including dictionary attacks
  (password guessing attacks), password management policies, and one-time
  password mechanisms.
– Explain and compare security mechanisms for conventional operating systems,
  including
– memory, time, file, object protection requirements and techniques and protection
  in contemporary operating systems.
– Explain the requirements for trusted operating systems, and describe the
  independent evaluation, including evaluation criteria and evaluation process.
– Describe security requirements for database security, and describe techniques for
  ensuring database reliability and integrity, secrecy, inference control, and multi-
  level databases.
– Describe threats to networks, and explain techniques for ensuring network
  security, including encryption, authentication, firewalls, and intrusion detection.
– Explain the requirements and techniques for security management, including
  security policies, risk analysis, and physical threats and controls.
Textbook:
• Charles P. Pfleeger and Shari L. Pfleeger.
  Security in Computing (3 rd edition). Prentice-
  Hall. 2003. ISBN: 0-13-035548-8.
Course Organization and Scope:
• (Assume each lecture takes 75 minutes. The
  following topics need 28 lectures. These will be
  adjusted based on the actual progress in a
  semester.)
• T1. Introduction (1 lecture)
   – Basic concepts: threats, vulnerabilities, controls; risk;
     confidentiality, integrity, availability; security policies, security
     mechanisms; assurance; prevention, detection, deterrence
• T2. Basic cryptography (2 lectures)
   –   Basic cryptographic terms
   –   Historical background
   –   Symmetric crypto primitives
   –   Modes of operation
   –   Cryptographic hash functions
   –   Asymmetric crypto primitives
•   T3. Program security (3 lectures)
     –   Flaws
     –   Malicious code: viruses, Trojan horses, worms
     –   Program flaws: buffer overflows, time-of-check to time-of-use flaws, incomplete mediation
     –   Defenses
     –   Software development controls
     –   Testing techniques
•   T4. Security in conventional operating systems (4 lectures)
     –  Memory, time, file, object protection requirements and techniques
     –  Protection in contemporary operating systems
     –  Identification and authentication
     –  Identification goals
     –  Authentication requirements
     –  Human authentication
     –  Machine authentication
     Mid-term Review: topics 1 – 4 (TEST)
• T5. Trusted operating systems (5 lectures)
   –   Assurance; trust
   –   Design principles
   –   Evaluation criteria
   –   Evaluation process
• T6. Database management systems security (6
  lectures)
   –   Database integrity
   –   Database secrecy
   –   Inference control
   –   Multilevel databases
• Network security (7 lectures)
  – Network threats: eavesdropping, spoofing,
    modification, denial of service attacks
  – Introduction to network security techniques:
    firewalls, virtual private networks, intrusion
    detection,
• T8. Management of security (8 lectures)
   – o Security policies
   – o Risk analysis
   – o Physical threats and controls
• T9. Miscellaneous (9 lecture)
   – o Legal aspects of security
   – o Privacy and ethics
• Final review: topics 1 – 9 (1 lecture)
Schedule of reading assignments:
•   Topic T1: Chapter 1.
•   Topic T2: Chapter 2.
•   Topic T3: Chapter 3.
•   Topic T4: Chapter 4
•   Topic T5: Chapter 5.
•   Topic T6: Chapter 6.
•   Topic T7: Chapter 7.
•   Topic T8: Chapter 8.
•   Topic T9: Chapter 9.
•   Note: All Reading assignements Will Be posted on
    facebook
Projected schedule of homework due
     dates, quizzes and exams:
• There will be one online / Facebook assignment
  for each topic and there will be a midterm and a
  final exam. The mid-term exam will be given
  after topic 4. The final exam is scheduled by the
  Institution.

More Related Content

What's hot

Network Security & Attacks
Network Security & AttacksNetwork Security & Attacks
Network Security & AttacksNetwax Lab
 
Security Mechanisms
Security MechanismsSecurity Mechanisms
Security Mechanismspriya_trehan
 
BAIT1103 Course Overview
BAIT1103 Course OverviewBAIT1103 Course Overview
BAIT1103 Course Overviewlimsh
 
Network Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and TechniquesNetwork Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and Techniqueswaqasahmad1995
 
Ethical hacking Chapter 3 - Network and Computer Attacks - Eric Vanderburg
Ethical hacking   Chapter 3 - Network and Computer Attacks - Eric VanderburgEthical hacking   Chapter 3 - Network and Computer Attacks - Eric Vanderburg
Ethical hacking Chapter 3 - Network and Computer Attacks - Eric VanderburgEric Vanderburg
 
Intruders
IntrudersIntruders
Intruderstechn
 
Ethical hacking Chapter 5 - Physical Information Gathering - Eric Vanderburg
Ethical hacking   Chapter 5 - Physical Information Gathering - Eric VanderburgEthical hacking   Chapter 5 - Physical Information Gathering - Eric Vanderburg
Ethical hacking Chapter 5 - Physical Information Gathering - Eric VanderburgEric Vanderburg
 
Lessons Learned from Teaching Intrusion Detection and Intrusion Prevention wi...
Lessons Learned from Teaching Intrusion Detection and Intrusion Prevention wi...Lessons Learned from Teaching Intrusion Detection and Intrusion Prevention wi...
Lessons Learned from Teaching Intrusion Detection and Intrusion Prevention wi...amiable_indian
 
Virus and hacker (2)mmm
Virus and hacker (2)mmmVirus and hacker (2)mmm
Virus and hacker (2)mmmandynova
 
Introduction of cryptography and network security
Introduction of cryptography and network securityIntroduction of cryptography and network security
Introduction of cryptography and network securityNEHA PATEL
 
Network security for E-Commerce
Network security for E-CommerceNetwork security for E-Commerce
Network security for E-CommerceHem Pokhrel
 
Ethical hacking Chapter 1 - Overview - Eric Vanderburg
Ethical hacking   Chapter 1 - Overview - Eric VanderburgEthical hacking   Chapter 1 - Overview - Eric Vanderburg
Ethical hacking Chapter 1 - Overview - Eric VanderburgEric Vanderburg
 

What's hot (20)

Network Security & Attacks
Network Security & AttacksNetwork Security & Attacks
Network Security & Attacks
 
Ch18
Ch18Ch18
Ch18
 
Security Mechanisms
Security MechanismsSecurity Mechanisms
Security Mechanisms
 
BAIT1103 Course Overview
BAIT1103 Course OverviewBAIT1103 Course Overview
BAIT1103 Course Overview
 
Network Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and TechniquesNetwork Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and Techniques
 
Ch20
Ch20Ch20
Ch20
 
Ethical hacking Chapter 3 - Network and Computer Attacks - Eric Vanderburg
Ethical hacking   Chapter 3 - Network and Computer Attacks - Eric VanderburgEthical hacking   Chapter 3 - Network and Computer Attacks - Eric Vanderburg
Ethical hacking Chapter 3 - Network and Computer Attacks - Eric Vanderburg
 
Ch19
Ch19Ch19
Ch19
 
Intruders
IntrudersIntruders
Intruders
 
Ethical hacking Chapter 5 - Physical Information Gathering - Eric Vanderburg
Ethical hacking   Chapter 5 - Physical Information Gathering - Eric VanderburgEthical hacking   Chapter 5 - Physical Information Gathering - Eric Vanderburg
Ethical hacking Chapter 5 - Physical Information Gathering - Eric Vanderburg
 
Lessons Learned from Teaching Intrusion Detection and Intrusion Prevention wi...
Lessons Learned from Teaching Intrusion Detection and Intrusion Prevention wi...Lessons Learned from Teaching Intrusion Detection and Intrusion Prevention wi...
Lessons Learned from Teaching Intrusion Detection and Intrusion Prevention wi...
 
Attack lecture #2 ppt
Attack lecture #2 pptAttack lecture #2 ppt
Attack lecture #2 ppt
 
Ch05 Network Defenses
Ch05 Network DefensesCh05 Network Defenses
Ch05 Network Defenses
 
Virus and hacker (2)mmm
Virus and hacker (2)mmmVirus and hacker (2)mmm
Virus and hacker (2)mmm
 
OSCh19
OSCh19OSCh19
OSCh19
 
Introduction of cryptography and network security
Introduction of cryptography and network securityIntroduction of cryptography and network security
Introduction of cryptography and network security
 
Network security for E-Commerce
Network security for E-CommerceNetwork security for E-Commerce
Network security for E-Commerce
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
 
Ethical hacking Chapter 1 - Overview - Eric Vanderburg
Ethical hacking   Chapter 1 - Overview - Eric VanderburgEthical hacking   Chapter 1 - Overview - Eric Vanderburg
Ethical hacking Chapter 1 - Overview - Eric Vanderburg
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
 

Similar to Introduction to computer security syllabus

Network Security 1st Lecture
Network Security 1st LectureNetwork Security 1st Lecture
Network Security 1st Lecturebabak danyal
 
Threat Hunting Professional Online Training Course
Threat Hunting Professional Online Training CourseThreat Hunting Professional Online Training Course
Threat Hunting Professional Online Training CourseShivamSharma909
 
Software Security Training
Software Security TrainingSoftware Security Training
Software Security TrainingBryan Len
 
01Introduction to Information Security.ppt
01Introduction to Information Security.ppt01Introduction to Information Security.ppt
01Introduction to Information Security.pptit160320737038
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityKumawat Dharmpal
 
Ch1 Cryptography network security slides.pptx
Ch1 Cryptography network security slides.pptxCh1 Cryptography network security slides.pptx
Ch1 Cryptography network security slides.pptxsalutiontechnology
 
computer architecture.ppt
computer architecture.pptcomputer architecture.ppt
computer architecture.pptPandiya Rajan
 
How to Prepare for the CISSP Exam
How to Prepare for the CISSP ExamHow to Prepare for the CISSP Exam
How to Prepare for the CISSP Examkoidis
 
The Golden Rules - Detecting more with RSA Security Analytics
The Golden Rules  - Detecting more with RSA Security AnalyticsThe Golden Rules  - Detecting more with RSA Security Analytics
The Golden Rules - Detecting more with RSA Security AnalyticsDemetrio Milea
 
introduction.pptx
introduction.pptxintroduction.pptx
introduction.pptxKelvinDube4
 
ch03Threat Modeling - Locking the Door to Vulnerabilities.ppt
ch03Threat Modeling - Locking the Door to Vulnerabilities.pptch03Threat Modeling - Locking the Door to Vulnerabilities.ppt
ch03Threat Modeling - Locking the Door to Vulnerabilities.pptgealehegn
 
Career In Information security
Career In Information securityCareer In Information security
Career In Information securityAnant Shrivastava
 
Penetration Testing Execution Phases
Penetration Testing Execution Phases Penetration Testing Execution Phases
Penetration Testing Execution Phases Nasir Bhutta
 
Caveon Webinar Series: The Good and Bad of Online Proctoring
Caveon Webinar Series: The Good and Bad of Online ProctoringCaveon Webinar Series: The Good and Bad of Online Proctoring
Caveon Webinar Series: The Good and Bad of Online ProctoringCaveon Test Security
 

Similar to Introduction to computer security syllabus (20)

Network Security 1st Lecture
Network Security 1st LectureNetwork Security 1st Lecture
Network Security 1st Lecture
 
Threat Hunting Professional Online Training Course
Threat Hunting Professional Online Training CourseThreat Hunting Professional Online Training Course
Threat Hunting Professional Online Training Course
 
ch15.pdf
ch15.pdfch15.pdf
ch15.pdf
 
Software Security Training
Software Security TrainingSoftware Security Training
Software Security Training
 
01Introduction to Information Security.ppt
01Introduction to Information Security.ppt01Introduction to Information Security.ppt
01Introduction to Information Security.ppt
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Ch1 Cryptography network security slides.pptx
Ch1 Cryptography network security slides.pptxCh1 Cryptography network security slides.pptx
Ch1 Cryptography network security slides.pptx
 
Chapter 1.ppt
Chapter 1.pptChapter 1.ppt
Chapter 1.ppt
 
computer architecture.ppt
computer architecture.pptcomputer architecture.ppt
computer architecture.ppt
 
Chapter 1.ppt
Chapter 1.pptChapter 1.ppt
Chapter 1.ppt
 
Careers in Cyber Security
Careers in Cyber SecurityCareers in Cyber Security
Careers in Cyber Security
 
How to Prepare for the CISSP Exam
How to Prepare for the CISSP ExamHow to Prepare for the CISSP Exam
How to Prepare for the CISSP Exam
 
The Golden Rules - Detecting more with RSA Security Analytics
The Golden Rules  - Detecting more with RSA Security AnalyticsThe Golden Rules  - Detecting more with RSA Security Analytics
The Golden Rules - Detecting more with RSA Security Analytics
 
Isys20261 lecture 01
Isys20261 lecture 01Isys20261 lecture 01
Isys20261 lecture 01
 
introduction.pptx
introduction.pptxintroduction.pptx
introduction.pptx
 
ch03Threat Modeling - Locking the Door to Vulnerabilities.ppt
ch03Threat Modeling - Locking the Door to Vulnerabilities.pptch03Threat Modeling - Locking the Door to Vulnerabilities.ppt
ch03Threat Modeling - Locking the Door to Vulnerabilities.ppt
 
Career In Information security
Career In Information securityCareer In Information security
Career In Information security
 
Security chapter6
Security chapter6Security chapter6
Security chapter6
 
Penetration Testing Execution Phases
Penetration Testing Execution Phases Penetration Testing Execution Phases
Penetration Testing Execution Phases
 
Caveon Webinar Series: The Good and Bad of Online Proctoring
Caveon Webinar Series: The Good and Bad of Online ProctoringCaveon Webinar Series: The Good and Bad of Online Proctoring
Caveon Webinar Series: The Good and Bad of Online Proctoring
 

More from Ayebazibwe Kenneth

National guidelines and manual for innovation fund for green jobs creation
National guidelines and manual for innovation fund for green jobs creation National guidelines and manual for innovation fund for green jobs creation
National guidelines and manual for innovation fund for green jobs creation Ayebazibwe Kenneth
 
INNOVATION FUND FOR GREEN JOB CREATION: BUSINESS PLAN TEMPLATE
INNOVATION FUND FOR GREEN JOB CREATION: BUSINESS PLAN TEMPLATE INNOVATION FUND FOR GREEN JOB CREATION: BUSINESS PLAN TEMPLATE
INNOVATION FUND FOR GREEN JOB CREATION: BUSINESS PLAN TEMPLATE Ayebazibwe Kenneth
 
INNOVATION FUND PROJECTS APPLICATION FORM
INNOVATION FUND PROJECTS APPLICATION FORM INNOVATION FUND PROJECTS APPLICATION FORM
INNOVATION FUND PROJECTS APPLICATION FORM Ayebazibwe Kenneth
 
ADVERTISEMENT: MINISTRY OF GENDER, LABOUR AND SOCIAL DEVELOPMENT
ADVERTISEMENT:  MINISTRY OF GENDER, LABOUR AND SOCIAL DEVELOPMENT ADVERTISEMENT:  MINISTRY OF GENDER, LABOUR AND SOCIAL DEVELOPMENT
ADVERTISEMENT: MINISTRY OF GENDER, LABOUR AND SOCIAL DEVELOPMENT Ayebazibwe Kenneth
 
Uganda Woman Magazine IJssue 5
Uganda Woman Magazine IJssue 5 Uganda Woman Magazine IJssue 5
Uganda Woman Magazine IJssue 5 Ayebazibwe Kenneth
 
Uganda woman issue 4 march 2014 web
Uganda woman issue 4 march 2014 webUganda woman issue 4 march 2014 web
Uganda woman issue 4 march 2014 webAyebazibwe Kenneth
 
International women's day synopsis policy guidelines
International women's day synopsis   policy guidelinesInternational women's day synopsis   policy guidelines
International women's day synopsis policy guidelinesAyebazibwe Kenneth
 
Uganda Woman Magazine October 2013
Uganda Woman Magazine October 2013Uganda Woman Magazine October 2013
Uganda Woman Magazine October 2013Ayebazibwe Kenneth
 
Press release for the celebration of the international day against child labour
Press release for the celebration of the international day against child labourPress release for the celebration of the international day against child labour
Press release for the celebration of the international day against child labourAyebazibwe Kenneth
 
Connecting Grassroots Women to Development
Connecting Grassroots Women to DevelopmentConnecting Grassroots Women to Development
Connecting Grassroots Women to DevelopmentAyebazibwe Kenneth
 
Commemoration of the international day of families 15th may 2013
Commemoration of the international day of families 15th may 2013Commemoration of the international day of families 15th may 2013
Commemoration of the international day of families 15th may 2013Ayebazibwe Kenneth
 
International women’s day (iwd) 2013 synopsis
International women’s day (iwd) 2013 synopsisInternational women’s day (iwd) 2013 synopsis
International women’s day (iwd) 2013 synopsisAyebazibwe Kenneth
 
Statement by hon. rukia nakadama isanga the minister of state for gender and ...
Statement by hon. rukia nakadama isanga the minister of state for gender and ...Statement by hon. rukia nakadama isanga the minister of state for gender and ...
Statement by hon. rukia nakadama isanga the minister of state for gender and ...Ayebazibwe Kenneth
 

More from Ayebazibwe Kenneth (20)

National guidelines and manual for innovation fund for green jobs creation
National guidelines and manual for innovation fund for green jobs creation National guidelines and manual for innovation fund for green jobs creation
National guidelines and manual for innovation fund for green jobs creation
 
INNOVATION FUND FOR GREEN JOB CREATION: BUSINESS PLAN TEMPLATE
INNOVATION FUND FOR GREEN JOB CREATION: BUSINESS PLAN TEMPLATE INNOVATION FUND FOR GREEN JOB CREATION: BUSINESS PLAN TEMPLATE
INNOVATION FUND FOR GREEN JOB CREATION: BUSINESS PLAN TEMPLATE
 
INNOVATION FUND PROJECTS APPLICATION FORM
INNOVATION FUND PROJECTS APPLICATION FORM INNOVATION FUND PROJECTS APPLICATION FORM
INNOVATION FUND PROJECTS APPLICATION FORM
 
ADVERTISEMENT: MINISTRY OF GENDER, LABOUR AND SOCIAL DEVELOPMENT
ADVERTISEMENT:  MINISTRY OF GENDER, LABOUR AND SOCIAL DEVELOPMENT ADVERTISEMENT:  MINISTRY OF GENDER, LABOUR AND SOCIAL DEVELOPMENT
ADVERTISEMENT: MINISTRY OF GENDER, LABOUR AND SOCIAL DEVELOPMENT
 
Uganda Woman Magazine IJssue 5
Uganda Woman Magazine IJssue 5 Uganda Woman Magazine IJssue 5
Uganda Woman Magazine IJssue 5
 
Uganda woman issue 4 march 2014 web
Uganda woman issue 4 march 2014 webUganda woman issue 4 march 2014 web
Uganda woman issue 4 march 2014 web
 
International women's day synopsis policy guidelines
International women's day synopsis   policy guidelinesInternational women's day synopsis   policy guidelines
International women's day synopsis policy guidelines
 
Uganda Woman Magazine October 2013
Uganda Woman Magazine October 2013Uganda Woman Magazine October 2013
Uganda Woman Magazine October 2013
 
Press release for the celebration of the international day against child labour
Press release for the celebration of the international day against child labourPress release for the celebration of the international day against child labour
Press release for the celebration of the international day against child labour
 
Connecting Grassroots Women to Development
Connecting Grassroots Women to DevelopmentConnecting Grassroots Women to Development
Connecting Grassroots Women to Development
 
Commemoration of the international day of families 15th may 2013
Commemoration of the international day of families 15th may 2013Commemoration of the international day of families 15th may 2013
Commemoration of the international day of families 15th may 2013
 
International women’s day (iwd) 2013 synopsis
International women’s day (iwd) 2013 synopsisInternational women’s day (iwd) 2013 synopsis
International women’s day (iwd) 2013 synopsis
 
Statement by hon. rukia nakadama isanga the minister of state for gender and ...
Statement by hon. rukia nakadama isanga the minister of state for gender and ...Statement by hon. rukia nakadama isanga the minister of state for gender and ...
Statement by hon. rukia nakadama isanga the minister of state for gender and ...
 
Lecture one
Lecture oneLecture one
Lecture one
 
Lecture two
Lecture twoLecture two
Lecture two
 
Iatj call for applications
Iatj call for applicationsIatj call for applications
Iatj call for applications
 
Module 4 unit 1
Module 4  unit 1Module 4  unit 1
Module 4 unit 1
 
Internet 2
Internet 2Internet 2
Internet 2
 
Module 3 unit 1
Module 3  unit 1Module 3  unit 1
Module 3 unit 1
 
Internet
InternetInternet
Internet
 

Introduction to computer security syllabus

  • 1. Introduction to Computer Security Syllabus By Kenneth Ayebazibwe kynaye@gmail.com 256774185458 / 256702555890
  • 2. Course prerequisites or restrictive statements: • Basic knowledge on operating systems; C programming skills
  • 3. Student learning outcomes: • By the end of this course, students will be able to: – State the basic concepts in information security, including security policies, security models, and security mechanisms. – Explain concepts related to applied cryptography, including plain-text, cipher-text, the four techniques for crypto-analysis, symmetric cryptography, asymmetric cryptography, digital – signature, message authentication code, hash functions, and modes of encryption operations. – Explain the concepts of malicious code, including virus, Trojan horse, and worms. – Explain common vulnerabilities in computer programs, including buffer overflow – vulnerabilities, time-of-check to time-of-use flaws, incomplete mediation. – Outline the requirements and mechanisms for identification and authentication
  • 4. – Explain issues about password authentication, including dictionary attacks (password guessing attacks), password management policies, and one-time password mechanisms. – Explain and compare security mechanisms for conventional operating systems, including – memory, time, file, object protection requirements and techniques and protection in contemporary operating systems. – Explain the requirements for trusted operating systems, and describe the independent evaluation, including evaluation criteria and evaluation process. – Describe security requirements for database security, and describe techniques for ensuring database reliability and integrity, secrecy, inference control, and multi- level databases. – Describe threats to networks, and explain techniques for ensuring network security, including encryption, authentication, firewalls, and intrusion detection. – Explain the requirements and techniques for security management, including security policies, risk analysis, and physical threats and controls.
  • 5. Textbook: • Charles P. Pfleeger and Shari L. Pfleeger. Security in Computing (3 rd edition). Prentice- Hall. 2003. ISBN: 0-13-035548-8.
  • 6. Course Organization and Scope: • (Assume each lecture takes 75 minutes. The following topics need 28 lectures. These will be adjusted based on the actual progress in a semester.)
  • 7. • T1. Introduction (1 lecture) – Basic concepts: threats, vulnerabilities, controls; risk; confidentiality, integrity, availability; security policies, security mechanisms; assurance; prevention, detection, deterrence • T2. Basic cryptography (2 lectures) – Basic cryptographic terms – Historical background – Symmetric crypto primitives – Modes of operation – Cryptographic hash functions – Asymmetric crypto primitives
  • 8. T3. Program security (3 lectures) – Flaws – Malicious code: viruses, Trojan horses, worms – Program flaws: buffer overflows, time-of-check to time-of-use flaws, incomplete mediation – Defenses – Software development controls – Testing techniques • T4. Security in conventional operating systems (4 lectures) – Memory, time, file, object protection requirements and techniques – Protection in contemporary operating systems – Identification and authentication – Identification goals – Authentication requirements – Human authentication – Machine authentication Mid-term Review: topics 1 – 4 (TEST)
  • 9. • T5. Trusted operating systems (5 lectures) – Assurance; trust – Design principles – Evaluation criteria – Evaluation process • T6. Database management systems security (6 lectures) – Database integrity – Database secrecy – Inference control – Multilevel databases
  • 10. • Network security (7 lectures) – Network threats: eavesdropping, spoofing, modification, denial of service attacks – Introduction to network security techniques: firewalls, virtual private networks, intrusion detection,
  • 11. • T8. Management of security (8 lectures) – o Security policies – o Risk analysis – o Physical threats and controls • T9. Miscellaneous (9 lecture) – o Legal aspects of security – o Privacy and ethics • Final review: topics 1 – 9 (1 lecture)
  • 12. Schedule of reading assignments: • Topic T1: Chapter 1. • Topic T2: Chapter 2. • Topic T3: Chapter 3. • Topic T4: Chapter 4 • Topic T5: Chapter 5. • Topic T6: Chapter 6. • Topic T7: Chapter 7. • Topic T8: Chapter 8. • Topic T9: Chapter 9. • Note: All Reading assignements Will Be posted on facebook
  • 13. Projected schedule of homework due dates, quizzes and exams: • There will be one online / Facebook assignment for each topic and there will be a midterm and a final exam. The mid-term exam will be given after topic 4. The final exam is scheduled by the Institution.